Skip to main content

Expose Lab: Automated Active Directory Lab + Mini CTF Inside!

·543 words·3 mins·
Ashif Iqubal
Author
Ashif Iqubal
Hello, Fri3nd!
Ashifcoder/exposelab

This is a fully automated Active directory Lab made with the purpose to reduce the hustle of creating it manually.

PHP
92
17

Lab Overview 💻
#

This lab is themed after TV series Mr. Robot :) This is a fully automated Active Directory Lab made with the purpose of reducing the hassle of creating it manually. It uses Vagrant and Powershell Scripts to automate stuff. It also contain a small CTF kind of senerio.

Lab preinstalled
#

  • Active directory Services.
  • Chocholotary ( firefox, 7zip, Notepad++ ).
  • Internal Network (for Tunnelling practice).
  • sysinternals installed on every system.

Installation Script by @Lavender-exe
#

separately ⚠ Tested on Ubuntu LTS 22.04

chmod +x install-expose.sh
sudo ./install-expose.sh

Manual Installation
#

Installation Dependencies 📋
#

Virtual Box
#

Latest Version https://www.virtualbox.org/wiki/Downloads

For version 6.1 https://www.virtualbox.org/wiki/Download_Old_Builds_6_1

General update of the system
#

sudo apt-get update 
sudo apt-get install -y linux-headers-generic

Vagrant Installation
#

Linux ( Debian )

wget -O- https://apt.releases.hashicorp.com/gpg | gpg --dearmor | sudo tee /usr/share/keyrings/hashicorp-archive-keyring.gpg
echo "deb [signed-by=/usr/share/keyrings/hashicorp-archive-keyring.gpg] https://apt.releases.hashicorp.com $(lsb_release -cs) main" | sudo tee /etc/apt/sources.list.d/hashicorp.list
sudo apt update && sudo apt install vagrant

Windows & Other Operating Systems

visit https://developer.hashicorp.com/vagrant/downloads

Installing plugins
#

vagrant plugin install vagrant-windows-sysprep

Building the lab Infrastructure
#

Build will take approximately ⏳

  • Starting form scratch 2hr .
  • If the vagrant images are already downloaded 50 min . ( Grab a Coffee! ☕️ )

Vagrant Cloud Images used

# Vulnerable Web Server Machine [Ubuntu]
chrislentz/trusty64-lamp

# Domain Controller [Windows Server 2019]
rgl/windows-server-2019-standard-amd64

# Client Machies [Windows 10]
rgl/windows-10-1809-enterprise-amd64

Video Tutorial 📹
#

  1. Step by Step Installaion of the lab + code Explatation
  1. Solving the Mini CTF Challange!

Making the lab

git clone https://github.com/Ashifcoder/exposelab.git
cd exposelab
vagrant up

Note: If IP address configuration allowed range Error occurs. Run the commands from the network troubleshooting section below.

Default Credentials
#

vagrant : vagrant 

Other Users on the Lab

UserMachine
mrrobotRootDC
AngelaWebServer
DarleneWindows Client 1
TyrellWindows Client 2
ElliotN0t-F0uND

Thing can be done manually
#

Run the remove-vagrant.ps1 as a Different user not as vagrant

or

Run the commands Manually

#-----------manually Command to run -----------

# Write Manually to disable the network of vagrant
Write-Host -ForegroundColor Green [-] Disabling the vagrent Network on the machine [-]

Get-NetAdapter ; Disable-NetAdapter -Name 'Ethernet' -Confirm:$False ; Write-Host -ForegroundColor Green "[+] Enabled" ; Get-NetAdapter

# Write Manually to remove the vagrant user from the system
Write-Host -ForegroundColor Green [-] Removing Vagrant User [-]
Remove-LocalUser -Name 'vagrant'

To remove the virtualBox Boxes
#

vagrant destroy 

Troubleshooting ⚒
#

Network Troubleshooting

Setting virtual box Networks

sudo vim /etc/vbox/networks.conf 

Should contain

* 10.0.0.0/8 192.168.0.0/16 195.0.0.0/8 172.16.0.0/8
* 2001::/64

Disclaimer:
#

All the code provided on this repository is for educational/research purposes only. Any actions and/or activities related to the material contained within this repository is solely your responsibility. The misuse of the code in this repository can result in criminal charges brought against the persons in question. Author will not be held responsible in the event any criminal charges be brought against any individuals misusing the code in this repository to break the law.

GPL V3 License
#


Honourable Mentions
#

Amazing websites:
#